ua nt - p h / 03 10 15 6 v 1 2 6 O ct 2 00 3 Quantum and classical advantage distillation are not equivalent

نویسندگان

  • Leong Chuang
  • Berthold-Georg Englert
چکیده

We report that, for the generation of a secure cryptographic key from correlations established through a noisy quantum channel, the quantum and classical advantage distillation procedures are not equivalent, when coherent eavesdropping attacks are duly taken into account. The quantum procedure can tolerate markedly more noise in the channel than the classical procedure. One of the important problems in quantum cryptography is whether classical methods of key distillation are equivalent to quantum methods. This problem was recently investigated for a certain class of protocols in Refs. [1, 2, 3]. It was concluded there that the quantum entanglement distillation [4] tolerates exactly the same amount of errors in a raw cryptographic key as classical advantage distillation [5]. The analysis was carried out under the assumption that Eve performs the most general incoherent attack. In this short note [6] we report that this equivalence is only apparent, in fact classical advantage distillation is not as powerful as quantum entanglement distillation. This is so because Eve has the option of coherent attacks

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ua nt - p h / 04 03 11 8 v 1 1 6 M ar 2 00 4 Experimental Purification of Single Qubits

We report the experimental realization of the purification protocol for single qubits sent through a depolarization channel. The qubits are associated with polarization encoded photon particles and the protocol is achieved by means of passive linear optical elements. The present approach may represent a convenient alternative to the distillation and error correction protocols of quantum informa...

متن کامل

ua nt - p h / 01 01 09 8 v 2 18 S ep 2 00 1 Quantum cryptography

II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principl...

متن کامل

ar X iv : q ua nt - p h / 06 10 15 3 v 1 18 O ct 2 00 6 Subsystem Codes

We investigate various aspects of operator quantum error-correcting codes or, as we prefer to call them, subsystem codes. We give various methods to derive subsystem codes from classical codes. We give a proof for the existence of subsystem codes using a counting argument similar to the quantum Gilbert-Varshamov bound. We derive linear programming bounds and other upper bounds. We answer the qu...

متن کامل

ar X iv : q ua nt - p h / 02 03 04 6 v 1 1 1 M ar 2 00 2 Quantum imaging

We provide a brief overview of the newly born field of quantum imaging, and discuss some concepts that lie at the root of this field.

متن کامل

ua nt - p h / 03 10 18 6 v 1 3 1 O ct 2 00 3 There Is No Basis Ambiguity in Everett Quantum Mechanics ∗

The Everett-interpretation description of isolated measurements, i.e., measurements involving interaction between a measuring apparatus and a measured system but not interaction with the environment, is shown to be unambiguous, claims in the literature to the contrary notwithstanding. The appearance of ambiguity in such measurements is engendered by the fact that, in the Schrödinger picture, in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003